UNPKG

auth0

Version:
139 lines 7.26 kB
"use strict"; var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { if (k2 === undefined) k2 = k; var desc = Object.getOwnPropertyDescriptor(m, k); if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { desc = { enumerable: true, get: function() { return m[k]; } }; } Object.defineProperty(o, k2, desc); }) : (function(o, m, k, k2) { if (k2 === undefined) k2 = k; o[k2] = m[k]; })); var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { Object.defineProperty(o, "default", { enumerable: true, value: v }); }) : function(o, v) { o["default"] = v; }); var __importStar = (this && this.__importStar) || function (mod) { if (mod && mod.__esModule) return mod; var result = {}; if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); __setModuleDefault(result, mod); return result; }; Object.defineProperty(exports, "__esModule", { value: true }); exports.IDTokenValidator = exports.IdTokenValidatorError = void 0; const jose = __importStar(require("jose")); const DEFAULT_CLOCK_TOLERANCE = 60; // secs class IdTokenValidatorError extends Error { } exports.IdTokenValidatorError = IdTokenValidatorError; class IDTokenValidator { constructor({ domain, clientId, clientSecret, agent, headers, timeoutDuration, idTokenSigningAlg = 'RS256', clockTolerance = DEFAULT_CLOCK_TOLERANCE, }) { this.jwks = jose.createRemoteJWKSet(new URL(`https://${domain}/.well-known/jwks.json`), { timeoutDuration, agent, headers, }); this.alg = idTokenSigningAlg; this.audience = clientId; this.secret = new TextEncoder().encode(clientSecret); this.issuer = `https://${domain}/`; this.clockTolerance = clockTolerance; } async validate(idToken, { nonce, maxAge, organization } = {}) { const secret = this.alg === 'HS256' ? this.secret : this.jwks; const header = jose.decodeProtectedHeader(idToken); const payload = jose.decodeJwt(idToken); // Check algorithm if (header.alg !== 'RS256' && header.alg !== 'HS256') { throw new Error(`Signature algorithm of "${header.alg}" is not supported. Expected the ID token to be signed with "RS256" or "HS256".`); } // Issuer if (!payload.iss || typeof payload.iss !== 'string') { throw new IdTokenValidatorError('Issuer (iss) claim must be a string present in the ID token'); } if (payload.iss !== this.issuer) { throw new IdTokenValidatorError(`Issuer (iss) claim mismatch in the ID token; expected "${this.issuer}", found "${payload.iss}"`); } // Subject if (!payload.sub || typeof payload.sub !== 'string') { throw new IdTokenValidatorError('Subject (sub) claim must be a string present in the ID token'); } // Audience if (!payload.aud || !(typeof payload.aud === 'string' || Array.isArray(payload.aud))) { throw new IdTokenValidatorError('Audience (aud) claim must be a string or array of strings present in the ID token'); } if (Array.isArray(payload.aud) && !payload.aud.includes(this.audience)) { throw new IdTokenValidatorError(`Audience (aud) claim mismatch in the ID token; expected "${this.audience}" but was not one of "${payload.aud.join(', ')}"`); } else if (typeof payload.aud === 'string' && payload.aud !== this.audience) { throw new IdTokenValidatorError(`Audience (aud) claim mismatch in the ID token; expected "${this.audience}" but found "${payload.aud}"`); } // Organization if (organization) { if (organization.indexOf('org_') === 0) { if (!payload.org_id || typeof payload.org_id !== 'string') { throw new Error('Organization Id (org_id) claim must be a string present in the ID token'); } } else { if (!payload.org_name || typeof payload.org_name !== 'string') { throw new Error('Organization Name (org_name) claim must be a string present in the ID token'); } } } // Time validation (epoch) const now = Math.floor(Date.now() / 1000); // Expires at if (!payload.exp || typeof payload.exp !== 'number') { throw new IdTokenValidatorError('Expiration Time (exp) claim must be a number present in the ID token'); } const expTime = payload.exp + this.clockTolerance; if (now > expTime) { throw new IdTokenValidatorError(`Expiration Time (exp) claim error in the ID token; current time (${now}) is after expiration time (${expTime})`); } // Issued at if (!payload.iat || typeof payload.iat !== 'number') { throw new IdTokenValidatorError('Issued At (iat) claim must be a number present in the ID token'); } // Nonce if (nonce || payload.nonce) { if (!payload.nonce || typeof payload.nonce !== 'string') { throw new IdTokenValidatorError('Nonce (nonce) claim must be a string present in the ID token'); } if (payload.nonce !== nonce) { throw new IdTokenValidatorError(`Nonce (nonce) claim mismatch in the ID token; expected "${nonce}", found "${payload.nonce}"`); } } // Authorized party if (Array.isArray(payload.aud) && payload.aud.length > 1) { if (!payload.azp || typeof payload.azp !== 'string') { throw new IdTokenValidatorError('Authorized Party (azp) claim must be a string present in the ID token when Audience (aud) claim has multiple values'); } if (payload.azp !== this.audience) { throw new IdTokenValidatorError(`Authorized Party (azp) claim mismatch in the ID token; expected "${this.audience}", found "${payload.azp}"`); } } // Authentication time if (maxAge) { if (!payload.auth_time || typeof payload.auth_time !== 'number') { throw new IdTokenValidatorError('Authentication Time (auth_time) claim must be a number present in the ID token when Max Age (max_age) is specified'); } const authValidUntil = payload.auth_time + maxAge + this.clockTolerance; if (now > authValidUntil) { throw new IdTokenValidatorError(`Authentication Time (auth_time) claim in the ID token indicates that too much time has passed since the last end-user authentication. Currrent time (${now}) is after last auth at ${authValidUntil}`); } } await jose.jwtVerify(idToken, secret, { issuer: this.issuer, audience: this.audience, clockTolerance: this.clockTolerance, maxTokenAge: maxAge, algorithms: ['HS256', 'RS256'], }); } } exports.IDTokenValidator = IDTokenValidator; //# sourceMappingURL=id-token-validator.js.map